• Aucun résultat trouvé

L’APPEL DE QUÉBEC

L’Appel de Québec a été lancé au terme de la Conférence Québec-UNESCO « Internet et la radicalisation des jeunes : prévenir, agir et vivre ensemble ». Ce document phare de la conférence, qui découle des travaux de 500 participants provenant de plus de 70 pays, invite les citoyens et la communauté internationale à agir pour combattre et prévenir la radicalisation.

Préoccupés par les manifestations d’intolérance et d’extrémisme violent qui menacent

les efforts mis en œuvre à l’échelle nationale et internationale en faveur de la paix, de la sécurité, de la protection et de la promotion des droits de la personne, de l’état de droit et du développement durable ;

Considérant que la radicalisation menant à la violence est un phénomène mondial, évolutif

et multiforme qui n’est pas associé à une seule religion, idéologie ou peuple ;

Soulignant que la prévention de la radicalisation menant à la violence est une responsabilité

commune au regard des principes et des valeurs consacrés par de nombreux instruments internationaux relatifs aux droits de la personne ;

Répondant à l’appel du secrétaire général des Nations Unies et à son Plan d’action pour la

prévention de l’extrémisme violent ;

Réaffirmant l’importance d’engager une démarche multidimensionnelle d’analyse et de

prévention des causes profondes de la radicalisation menant à la violence ;

S’inquiétant de la diffusion des idées extrémistes violentes facilitée par les nouveaux moyens

de communication, qui sont instrumentalisés à des fins de propagande extrémiste, de recrutement par des groupes radicaux et d’incitation à commettre des actes violents motivés par la haine et l’intolérance ;

Soulignant que les nouvelles technologies sont également un outil de prévention de la

radicalisation menant à la violence, notamment en permettant de proposer un contre- discours sur Internet favorisant l’éducation citoyenne et l’esprit critique, en appui aux droits de la personne, au dialogue, à la compréhension mutuelle et à la tolérance ;

Réaffirmant la pertinence d’œuvrer pour la pleine réalisation des buts et des objectifs de

développement durable adoptés sous l’égide des Nations Unies dans le cadre de l’Agenda 2030.

ANNEXE 5.

BIBLIOGRAPHIE SÉLECTIVE

D’OUVRAGES PUBLIÉS EN ANGLAIS

Adams, J., & Roscigno, V-J. (2005). White Supremacists, Oppositional Culture and the World Wide Web. Social Forces, 84(2), 759-778.

Adams, Josh, & Roscigno, Vincent. (2004/08/14/2004 Annual Meeting, San Francisco). White Supremacists, Oppositional Culture, and the World Wide Web.

Agarwal, S., & Sureka, A. (2015). Topic-Specific YouTube Crawling to Detect Online Radicalization Databases in Networked Information Systems, Lecture notes in computer

sciences, 8999, pp. 133-151.

Agarwal, S., & Sureka, A. (2015). Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter Distributed Computing and Internet Technology, Lecture

notes in computer sciences, 8956, pp. 431-442.

Aistrope, T. (2016). Social media and counterterrorism strategy. Australian Journal of

International Affairs, 70(2), 121-138.

Akinwumi, A- E. (2006). The Banality of the ImMEDIAte Spectacle: Globalization, Terrorism, Radical Cultural Denigration, and the Condition of Hollowity, International journal of

Baurbrillard Studies, 3: Bishop’s University.

Alarid, M. (2016). Recruitment and Radicalization: The Role of Social Media and New Technology. Center for Complex Operations, Washington, USA.

Alghamdi, H-M., & Selamat, A. (2012, November). Topic Detections in Arabic Dark Websites Using Improved Vector Space Model. 4th Conference on Data Mining and Optimization (Dmo), Langkawi, Malaysia.

Ali, M-M., Mohammed, K- M., & Rajamani, L. (2014). Framework for Surveillance of Instant Messages in Instant messengers and Social neworking sites using Data Mining and Ontology,

Ieee Students’ Technology Symposium, pp. 297-302.

Al-Rawi, Ahmed. (2016). Digital Media Literacy and its Role in Countering Division and Enhancing National Identity in the Arab World, Media and Information Literacy: Reinforcing

Humanm Rights, Countering Radicalization and Extremism, 291-297.

Al-Rowaily, K., Abulaish, M., Haldar, N. Al-H., & Al-Rubaian, M. (2015). BiSAL – A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security. Digital

Investigation, 14, 53-62.

Amble, John Curtis. (2012). Combating terrorism in the new media environment. Studies in

Ammerman, F. W. (2012). A Case Study Exploration of Islamic Radicalization in America: Interpretations for Corporate Risk Management. (3519947 Ph.D.), Northcentral University, Ann Arbor. Retrieved from http://search.proquest.com/ docview/1030973387?accountid=10246

Andre, V. (2012). Patani Militant Propaganda Dissemination and Radicalization. Asian Security,

8(1), 27-53. doi: 10.1080/14799855.2012.669207

Andre, Virginie. (2014). The Janus Face of New Media Propaganda: The Case of Patani Neojihadist YouTube Warfare and Its Islamophobic Effect on Cyber-Actors. Islam & Christian-Muslim Relations, 25(3), 335-356.

Argomaniz, Javier. (2015). European Union responses to terrorist use of the Internet. Cooperation & Conflict, 50(2), 250-268.

Atran, Scott, & Sageman, Marc. Connecting the dots. Bulletin of the Atomic Scientists, 62(4), 68-68.

Awan, Akin N. (2007). Virtual jihadist media. European Journal of Cultural Studies, 10(3), 389- 408.

Baines, Paul R., O’Shaughnessy, Nicholas J., Moloney, Kevin, Richards, Barry, Butler, Sara, & Gill, Mark. (2010). The dark side of political marketing Islamist propaganda, Reversal Theory and British Muslims. European Journal of Marketing, 44(3-4), 478-495.

Baker, Vicky. (2015). Social disturbance: From digital jihadis to hoaxes and propaganda, a look at how user-generated content lost its innocence. Index on Censorship, 44(1), 143-145. Bardos, Gordon N. (2014). Jihad in the Balkans. World Affairs, 177(3), 73-79.

Barnett, Brett Aaron. (2005). Untangling the web of hate: Are online “Hate Sites” deserving of First Amendment protection? (3193670 Ph.D.), Bowling Green State University, Ann Arbor. Retrieved from http://search.proquest.com/docview/305028910?accountid=10246

Barzilai-Nahon, Karine, & Barzilai, Gad. (2005). Cultured Technology: The Internet and Religious Fundamentalism. Information Society, 21(1), 25-40.

Bates, Rodger, & Mooney, Mara. (2014). Distance Learning and Jihad: The Dark Side of the Force. Online Journal of Distance Learning Administration, 17(3).

Benson, David C. (2014). Why the Internet Is Not Increasing Terrorism. Security Studies, 23(2), 293-328.

Bermingham, Adam, Conway, Maura, McInerney, Lisa, O’Hare, Neil, & Smeaton, Alan F. (2009). Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalization 2009 International Conference on Advances in Social Networks Analysis and Mining (pp. 231-236).

Bhui, Kamaldeep, & Ibrahim, Yasmin. (2013). Marketing the ‘radical’: Symbolic communication and persuasive technologies in jihadist websites. Transcultural Psychiatry, 50(2), 216-234. Biddle, S. (2015, March 13). Reddit Is So Racist White Supremacists Are Using it to Recruit.

Retrieved May 18, 2015, from http://gawker.com/reddit-is-so-racist-white-supremacists- areusing-it-to-1691162974

Bloom, Richard W. (2016). A bull market but whose bull is being gored? PsycCRITIQUES, 61(15).

Blumenfeld, Teri. (2012). Are Jihadists Crazy? Middle East Quarterly, 19(2), 3-13.

Bogomolov, T., & Chiera, B. (2013). A first approach to resolving ambiguity in hidden terrorist group detection in communications networks. 20th International Congress on Modelling and Simulation (Modsim2013), 120-126.

Boruch, R al. (2004). The Campbell Collaboration. Brief Treatment and Crisis Intervention Vol. 4 No. 3

Bosco, Francesca. (2013). Terrorist Use of the Internet Capacity Building in the Fight against Terrorism (Vol. 112, pp. 39-46).

Bowman-Grieve, Lorraine. (2009). Exploring “Stormfront”: A Virtual Community of the Radical Right. Studies in Conflict & Terrorism, 32(11), 989-1007.

Bräuchler, Birgit. (2004). Islamic Radicalism Online: The Moluccan Mission of the Laskar Jihad in Cyberspace. Australian Journal of Anthropology, 15(3), 267-285.

Bräuchler, Birgit. (2004). Islamic radicalism online: The Moluccan mission of the Laskar Jihad in cyberspace (English). The Australian journal of anthropology, 15(3), 267-285.

Bräuchler, Birgit. (2007). Religious Conflicts in Cyberage. Citizenship Studies, 11(4), 329-347 Brachman, Jarret M. (2006). High-Tech Terror: Al-Qaeda’s Use of New Technology. Fletcher

Forum of World Affairs, 30(2), 149-164.

Brachman, Jarret M., & Levine, Alix N. (2011). You Too Can Be Awlaki! Fletcher Forum of World Affairs, 35(1), 25-46.

Braddock, Kurt H. (2012). Fighting words: The persuasive effect of online extremist narratives on the radicalization process. (3534650 Ph.D.), The Pennsylvania State University, Ann Arbor. Retrieved from Retrieved from http://search.proquest.com/ docview/1275924546?accountid=10246

Bradforrs A., Frenett R. (2015). Becoming Mulan?: Female Western Migrants to DAESH. Institute for Strategic Dialogue

Brown, Ian, & Korff, Douwe. (2009). Terrorism and the proportionality of Internet surveillance. European Journal of Criminology, 6(2), 119-134.

Bruce, Gregor. (2013). Intrinsic and External Factors and Influences on the Motivation of Suicide Attackers. Journal of Military & Veterans’ Health, 21(3), 27-33.

Buckingham, D. (2008). Defining Digital Literacy. What do Young People Need to Know About Digital Media? C. Lankshear and M. Knobel (eds). Digital Literacies: Concepts, Policies, and

Practices.  Oxford: Peter Lang, 73-91

Burstow, Bonnie. (2003). Surviving and Thriving by Becoming More ‘Groupuscular’: The Case of the Heritage Front. Patterns of Prejudice, 37(4), 415-428.

Caiani, Manuela, & Parenti, Linda. (2011). The Spanish extreme right and the Internet. A extrema-direita espanhola e a internet., 46(201), 719-740.

Cavin, Susan. (2006). Theory of War Propaganda Technology: From WWII Radio to Video War Games. Paper presented at the Society for the Study of Social Problems. http://search. proquest.com/docview/61751812?accountid=10246

Cappello, M. and Chapman, M. (2016). Mapping of Media Literacy Practices and Actions in EU-28, Strasbourg: European Audiovisual Observatory.

Cardon, D., & Granjon, F. (2014). Médiactivistes. «  Individualisation et auto-organisation  ». Paris : Presses de Sciences Po 135-177.

Cebrian, Manuel, Torres, Manuel R., Huerta, Ramon, & Fowler, James H. (2013). Violent extremist group ecologies under stress. Scientific Reports, 3.

Celebi, Erdogan. (2010). Female Seperatism: The Role of Women in the PKK/KONGRA-GEL Terrorist Organization Terrorism and the Internet: Threats – Target Groups – Deradicalization Strategies (Vol. 67, pp. 105-112).

Celot, P (2014). Media Literacy European Policy Recommendations, EAVI, Brussels

Chao, En-Chieh. (2015). The-Truth-About-Islam.Com: Ordinary Theories of Racism and Cyber Islamophobia. Critical Sociology (Sage Publications, Ltd.), 41(1), 57-75.

Charvat, J. P. I. A. G. (2009). Cyber Terrorism: A New Dimension in Battlespace The Virtual Battlefield: Perspectives on Cyber Warfare (Vol. 3, pp. 77-87).

Chen, Hsinchun, Chung, Wingyan, Jialun, Q. I. N., Reid, Edna, Saqeman, Marc, & Weimann, Gabriel. (2008). Uncovering the Dark Web : A Case Study of Jihad on the Web (English). Journal of the American Society for Information Science and Technology (Print), 59 (8), 1347-1359.

Chen, Hsinchun, Thoms, Sven, & Fu, Tianjun. (2008). Cyber extremism in web 2.0: An exploratory study of international Jihadist groups Isi 2008: 2008 Ieee International Conference on Intelligence and Security Informatics (pp. 98-103).

Chen, Hsinchun. (2008). Sentiment and affect analysis of dark web forums: Measuring radicalization on the internet Isi 2008: 2008 Ieee International Conference on Intelligence and Security Informatics (pp. 104-109).

Chiluwa, Innocent, & Ajiboye, Esther. (2014). ‘We Are after Ideals’: A Critical Analysis of Ideology in the Tweets by Boko Haram. Global Media Journal : African Edition, 8(2), 318-346. Chiluwa, I. (2015). Radicalist discourse: a study of the stances of Nigeria’s Boko Haram and

Somalia’s Al Shabaab on Twitter. Journal of Multicultural Discourses, 10(2), 214-235. Cohen, J. (2015). Digital Counterinsurgency. Foreign Affairs, 94(6), 52-58.

Cohen, Jessica, & Blanco, Jose Maria. (2016). Media Information and Literacy to Tackle Social Polarization in Europe, Media and Information Literacy: Reinforcing Humanm Rights, Countering Radicalization and Extremism, 299-311.

Conversi, D. (2012). Irresponsible Radicalization: Diasporas, Globalisation and Long-Distance Nationalism in the Digital Age. Journal of Ethnic & Migration Studies, 38(9), 1357-1379. Conway, M. (2006). Reality bytes: cyber-terrorism and terrorist use of the Internet. (U221922

Ph.D.), Trinity College Dublin (University of Dublin) (Ireland), Ann Arbor. Retrieved from http://search.proquest.com/docview/301660701?accountid=10246

Conway, Maura, & McInerney, Lisa. (2008). Jihadi Video and Auto-radicalization: Evidence from an Exploratory YouTube Study Intelligence and Security Informatics, Proceedings (Vol. 5376, pp. 108-118).

Conway, Maura. Terrorism and the Internet: New Media‚ A New Threat? Parliamentary Affairs, 59(2), 283-298.

Costa, C., Car V. and Papadimitriou, S. (2017). Good practices and emerging trends in Frau- Meigs D., Velez, I. and Flores Michel J. (eds). MIL Public Policies in Europe: A Cross-Country

Comparison. London: Routledge.

Corman, S. R. (2011). Understanding the Role of Narratives in Extremist Strategic Communications. In: L. Fenstermacher and T. Leventhal (Eds.) Countering Violent

Extremism: Scientific Methods and Strategies. Wright-Patterson AFB, OH: AF Research

Laboratory, pp. 36–43.

Cornish, P., Lindley-French, J., & Yorke, C. (2011) Strategic Communication and National

Strategy: A Chatham House Report. London: Royal Institute of International Affairs.

Corb, Abbee. (2015). Online hate and cyber-bigotry: A glance at our radicalized online world. In N. Hall, A. Corb, P. Giannasi, J. G. D. Grieve, N. Hall, A. Corb, P. Giannasi & J. G. D. Grieve (Eds.), The Routledge international handbook on hate crime. (pp. 306-317). New York, NY, US: Routledge/Taylor & Francis Group.

Crabill, Scott L. (2008). Hate on the Internet. Florida Communication Journal, 36(2), 1-15. Crilley, Kathy. (2001). Information warfare: new battlefields terrorists, propaganda and the

Internet (English). Aslib proceedings: New information perspectives, 53(7), 250-264. Dagnes, Alison D. (2003). White noise: The political uses of Internet technology by right -wing

extremist groups. (3110477 Ph.D.), University of Massachusetts Amherst, Ann Arbor. Retrieved from http://search.proquest.com/docview/305321662?accountid=10246

Daniels, Jessie. (2009). Cloaked websites: Propaganda, cyber-racism and epistemology in the digital era. New Media & Society, 11(5), 659-683.

Dartnell, M. (2005). Communicative practice and transgressive global politics: The d’ua of Sheikh Muhammed Al Mohaisany. First Monday, 10(7), 1-1.

Davies, Lynn. (2014). Interrupting Extremism by Creating Educative Turbulence. Curriculum Inquiry, 44(4), 450-468. doi: 10.1111/curi.12061

Davis, Diane. (2013). 2013: Questioning Digital Activism. Currents in Electronic Literacy, 1-1. Demchak, Chris. (2006). Security Dilemmas and the Public Face of Covert Organizations:

Tracking Terrorists in the Internet. Conference Papers – International Studies Association, 1. Denning, Dorothy E. (2010). Terror’s web: How the Internet is transforming terrorism. In

Y. Jewkes, M. Yar, Y. Jewkes & M. Yar (Eds.), Handbook of Internet crime. (pp. 194-213). Devon, United Kingdom: Willan Publishing.

Der Derian, J. (2005). Imaging terror: logos, pathos and ethos. Third World Quarterly, 26(1), 23-37.

Du Preez, Madely. (2009). Hypermedia Seduction for Terrorist Recruiting. Online Information Review, 33(1), 208-209.

Earnhardt, R. (2014). Al-Qaeda’s Media Strategy: Internet self- radicalization and counter- radicalization policies, Virginia Commonwealth U.: L. Douglas Wilder School of Government and Public Affairs

Eiffler, Sven. (2010). Jihadist Propaganda on the Internet: Impact and Challenges for the Security Community Terrorism and the Internet: Threats – Target Groups – Deradicalization Strategies (Vol. 67, pp. 71-79).

Ekman, Mattias. (2015). Online Islamophobia and the politics of fear: Manufacturing the green scare. Ethnic and Racial Studies, 38(11), 1986-2002.

Espeseth, Craig, Gibson, Jessica, Jones, Andy, & Goodman, Seymour. (2013). Terrorist Use of Communication Technology and Social Networks Technological Dimensions of Defence against Terrorism (Vol. 115, pp. 91-105).

EU kids on line (2014). http://www.lse.ac.uk/media%40lse/research/EUKidsOnline/EU%20 Kids%20Online%20reports.aspx

Feilitzen, C. von, & Carlsson, U. (Eds.).  (2004).  Promote or protect? Perspectives on media

literacy and media regulations. Göteborg: UNESCO International Clearinghouse on

Children, Youth and Media, NORDICOM.

Feldman, Matthew. (2013). Comparative Lone Wolf Terrorism: Toward a Heuristic Definition. Democracy & Security, 9(3), 270-286

Fernandez, Alberto. (2015). “Contesting the Space” Adversarial Online Engagement as a Tool for Combating Violent Extremism. Soundings, 98(4), 488-500.

Fiddner, Mac. (2008). Medieval Ideology and 21st Century Technology: Al Qaeda, Terrorism and the Internet. Conference Papers. International Studies Association, 1-12.

Fink, N. C. & Barclay.J. (2013). Mastering the Narrative: Counterterrorism Strategic Communication

and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation;

http://globalcenter.org/wp-content/uploads/2013/03/Feb2013_CT_StratComm.pdf

Forest, James J. F. (2009). Influence Warfare and Modern Terrorism. Georgetown Journal of International Affairs, 10(1), 81-89.

Fuentes, Kendra M. (2016). Cyberterrorism: The use of social networking to recruit Westerners an informational guide for law enforcement agencies. (10107081 M.S.), Utica College, Ann Arbor. Retrieved from http://search.proquest.com/docview/1791468583?accountid=10246 Frau-Meigs, D. (2011) Socialisation des jeunes et éducation aux médias. Du bon usage des

contenus et comportements à risque. Toulouse : Erès.

Frau-Meigs, D. (2017). Media and Information Literacy (MIL): Taking the digital social turn for online freedoms and education 3.0. In H. Tumber & S. Waisbord (eds). The Routledge Companion to Media and Human Rights. London: Routledge.

Frau-Meigs, D. and Hibbard, L. (2016). Education 3.0 and Internet Governance: A new global alliance for children and young people’s sustainable digital development. Global Commission on Internet Governance Series n°27. London: Chatham House.

Frau-Meigs, D. & Torrent, J. (Eds.). (2009). Mapping media education policies in the world: visions, programmes and challenges. NY: UN-Alliance of Civilizations.

Frau-Meigs, D., Velez, I. & Flores Michel, J. (eds). (2017). MIL Public Policies in Europe: A Cross Country Comparison. London: Routledge.

Gerbner, G. (1988). Violence and Terror in the Mass Media.Reports and Papers in Mass Communication, No. 102. Paris: Unesco, March 1988.

Gercke, Marco. (2012). Legal Responses to Terrorist Use of the Internet Enhancing Cooperation in Defence against Terrorism (Vol. 99, pp. 19-34).

Gercke, Marco. (2012). Strategy, Policy, Legislation, Prevention and Enforcement: Components of a Comprehensive Approach in the Fight against Cybercrime and Terrorist Use of the Internet Analyzing Different Dimensions and New Threats in Defence against Terrorism (Vol. 104, pp. 11-21).

Gerstenfeld, Phyllis B., Grant, Diana R., & Chau-Pu, Chiang. (2003). Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues & Public Policy, 3(1), 29-44. Giacomello, Giampiero. (2004). Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism.

Studies in Conflict & Terrorism, 27(5), 387-408.

Goolsby, Rebecca. (2008). The DoD encounters the blogosphere Social Computing, Behavioral Modeling and Prediction (pp. 25-25).

Graham, Roderick. (2016). Inter-ideological mingling: White extremist ideology entering the mainstream on Twitter. Sociological Spectrum, 36(1), 24-36.

Grausam, Robert. (2005). The language of Islamic fundamentalism (English). AAA. Arbeiten aus Anglistik und Amerikanistik, 30(1-2), 227-241.

Grieve, L. B. (2006). Terrorist supporters and the internet: an exploration of online ‘virtual’ communities. (U233172 Ph.D.), University College Cork (Ireland), Ann Arbor. Retrieved from http://search.proquest.com/docview/301640885?accountid=10246

Grizzle, Alton, & Perez Tornero, Jose Manuel. (2016). Media and Information Literacy Against Online Hate, Radical, and Extremist Content: Some Preliminary Research Findings in Relation to Youth and A Research Design, Media and Information Literacy: Reinforcing

Human Rights, Countering Radicalization and Extremism, 179-201.

Grizzle, Alton, & Torras Calvo, Maria Carme. (2013). Media and Information Literacy Policy and Strategy Guidelines

Gruenewald, Jeff, Chermak, Steven, & Freilich, Joshua D. (2013). Distinguishing ‘Loner’ Attacks from Other Domestic Extremist Violence. Criminology & Public Policy, 12(1), 65-91. Guadagno, Rosanna E., Lankford, Adam, Muscanell, Nicole L., Okdie, Bradley M., &

McCallum, Debra M. (2010). Social influence in the online recruitment of terrorists and terrorist sympathizers: Implications for social psychology research. Revue Internationale de Psychologie Sociale, 23(1), 25-56.

Gul, Sumeer, & Shueb, Sheikh. (2016). Twitter as a Mourning Dove for the Blooming Buds: An Analysis of Twitter’s Reaction to Peshawar School Attack, Media and Information Literacy:

Reinforcing Humanm Rights, Countering Radicalization and Extremism, 237-247.

Gustavson, Aleta Top, & Sherkat, Darren E. (2004). Annual Meeting, San Francisco. The Ideological Structuring of White Supremacy on the Internet: Analyzing Network Size, Density, and Asymmetry.

Gut, Till. (2007). German Federal Court of Justice (Bundesgerichtshof—BGH), 3rd Criminal Senate. Journal of Criminal Law, 71(6), 491-496.

Hacohen, Eli. (2010). Digital Hate: Terror, Anti-Semitism and Racism on the Internet Terrorism and the Internet: Threats – Target Groups – Deradicalization Strategies (Vol. 67, pp. 3-6). Hai, Nadia. (2012). The Rhetoric of Terrorism: A Rhetorical Analysis of “Inspire” Magazine.

(MR91165 M.A.), University of Calgary (Canada), Ann Arbor. Retrieved from http://search. proquest.com/docview/1238289183?accountid=10246

Hale, W. Chris. (2012). Extremism on the World Wide Web: A research review. Criminal Justice Studies: A Critical Journal of Crime, Law & Society, 25(4), 343-356.

Harris, Candida, Rowbotham, Judith, & Stevenson, Kim. (2009). Truth, law and hate in the virtual marketplace of ideas: perspectives on the regulation of Internet content. Information & Communications Technology Law, 18(2), 155-184.

Harris, Candida, Rowbotham, Judith, & Stevenson, Kim. (2009). Truth, law and hate in the virtual marketplace of ideas: perspectives on the regulation of Internet content. Information & Communications Technology Law, 18(2), 155-184.

Hastings, Megan, & Rogerson, Kenneth. (2016). Battle of Narratives: Contesting ISIL’s Propaganda with Social Media. Conference Papers -- Southern Political Science Association, 1-34.

Hayne, Spencer O. (2010). Borderless world, boundless threat: Online Jihadists and modern terrorism. (1483143 M.A.), Georgetown University, Ann Arbor. Retrieved from http:// search.proquest.com/docview/818725727?accountid=10246

Hobbs, R. & Jensen, A. (2009). The Past, Present, and Future of Media Literacy Education. Journal

of Media Literacy Education, 1(1).

Hoechsmann, M., & Poyntz, S. R. (2012). Media literacies: a critical introduction. Malden, MA: Wiley-Blackwell.

Holbrook, Donald. (2015). A critical analysis of the role of the internet in the preparation and planning of acts of terrorism. Dynamics of Asymmetric Conflict, 8(2), 121-133.

Holtz, Peter, Kronberger, Nicole, & Wagner, Wolfgang. (2012). Analyzing internet forums: A practical guide. Journal of Media Psychology: Theories, Methods, and Applications, 24(2), 55-66.

Homeland Security Institute. (2009). The internet as a terrorist tool for recruitment & radicalization of youth. U.S. Department of Homeland Security, Science and Technology Directorate

Jaitner, Margarita, & Kantola, Harry. (2014). Countering Threats – a Comprehensive Model for Utilization of Social Media for Security and law Enforcement Authorities. Proceedings of the 13th European Conference on Cyber Warfare and Security (Eccws-2014), 102-109.

Janbek, Dana M. (2010). The use of the Internet as a communication medium by extremist Muslim groups: A content analysis of web sites. (70), ProQuest Information & Learning, US. Retrieved from http://0-search.ebscohost.com.mercury.concordia.ca/login. aspx?direct=true&db=psyh&AN=2010-99031-321&site=ehost-live&scope=site Available from EBSCOhost psyh database.

Jerard, Jolene. (2011). Facing the Challenge of the Evolving Terrorist Threat Analysis and Strategies to Counter the Terrorism Threat (Vol. 89, pp. 63-77).

Jenkins, H. with  Purushotma, R., Weigel, M., Clinton, K. & Robison, A.J. (2009). Confronting

the Challenges of Participatory Culture: Media Education for the 21st Century. Cambridge:

MIT and The John D. and Catherine T. MacArthur Foundation.

Johansson, Fredrik, Kaati, Lisa, & Shrestha, Amendra. (2013). Detecting Multiple Aliases in Social Media. 2013 Ieee/Acm International Conference on Advances in Social Networks Analysis and Mining (Asonam), 1004-1011.

Johnson, Jennifer L. (2011). Mobilizing Minutewomen: Gender, Cyberpower, and the New Nativist Movement. Research in Social Movements, Conflicts and Change(32), 137-161. Johnson, Matthew. (2016). Bridging the Gap: Empowering Digital Citizens to Build Positive

Online Communities, Media and Information Literacy: Reinforcing Humanm Rights, Countering Radicalization and Extremism, 87-94.

Jolls, Tessa, & Wilson, Carolyn. (2016). Youth Radicalization in Cyberspace: Enlisting Media and Information Literacy in the Battle for Hearts and Minds, Media and Information Literacy:

Reinforcing Humanm Rights, Countering Radicalization and Extremism, 167-178.

Kaplan, Jeffrey, Weinberg, Leonard, & Oleson, Ted. (2003). Dreams and realities in cyberspace: White Aryan Resistance and the World Church of the Creator. Patterns of Prejudice, 37(2), 139-155.

Kebbell, Mark R., & Porter, Louise. (2012). An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West. Security Journal,